This thesis investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. During the course of this project, a large data set consisting of applications published on Google Play and three different third-party Android application markets was collected over a two-month period. These applications are analysed using manual pattern recognition and k-means clustering, focusing on the permissions they request. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognise malicious potential in the analysed ap...
Information applications are widely used by millions of users to perform manydifferent activities. A...
In recent years, the amount of malware targeting Android users has increased dramatically. Among man...
Malware applications (Apps) targeting mobile devices are widespread, and compromise the sensitive an...
Several studies have examined Android apps’ use of permissions from a security point-of-view. Howeve...
AbstractAndroid is the world's most popular and the largest installed base of any mobile platform. I...
Application permissions at the core of Android security mechanism are the first leading transparent ...
Android security is built upon a permission-based mechanism, which restricts access of third-party A...
Smartphone adaptation in society has been progressing at a very high speed. Having the ability to ru...
The electronic devices such as a mobile have become popular day by day, which is the major target of...
An Android application uses a permission system to regulate the access to system resources and users...
In recent trends, the mobile devices play a very vital role in day to day activities of human beings...
AbstractAs increasing in number of Android phones there is simultaneous increase in mobile malware a...
The Android Market is the official (and primary) storefor Android applications. The Market provides ...
With the growing era of the Internet of Things (IoT), more and more devices are connecting with the ...
Android security is built upon a permission-based mechanism, which restricts access of third-party A...
Information applications are widely used by millions of users to perform manydifferent activities. A...
In recent years, the amount of malware targeting Android users has increased dramatically. Among man...
Malware applications (Apps) targeting mobile devices are widespread, and compromise the sensitive an...
Several studies have examined Android apps’ use of permissions from a security point-of-view. Howeve...
AbstractAndroid is the world's most popular and the largest installed base of any mobile platform. I...
Application permissions at the core of Android security mechanism are the first leading transparent ...
Android security is built upon a permission-based mechanism, which restricts access of third-party A...
Smartphone adaptation in society has been progressing at a very high speed. Having the ability to ru...
The electronic devices such as a mobile have become popular day by day, which is the major target of...
An Android application uses a permission system to regulate the access to system resources and users...
In recent trends, the mobile devices play a very vital role in day to day activities of human beings...
AbstractAs increasing in number of Android phones there is simultaneous increase in mobile malware a...
The Android Market is the official (and primary) storefor Android applications. The Market provides ...
With the growing era of the Internet of Things (IoT), more and more devices are connecting with the ...
Android security is built upon a permission-based mechanism, which restricts access of third-party A...
Information applications are widely used by millions of users to perform manydifferent activities. A...
In recent years, the amount of malware targeting Android users has increased dramatically. Among man...
Malware applications (Apps) targeting mobile devices are widespread, and compromise the sensitive an...